{"id":388,"date":"2015-02-24T05:31:30","date_gmt":"2015-02-24T05:31:30","guid":{"rendered":"http:\/\/www.theblackvault.com\/documentarchive\/?p=388"},"modified":"2023-11-22T12:49:20","modified_gmt":"2023-11-22T12:49:20","slug":"cryptology-and-the-united-states-intelligence-community","status":"publish","type":"post","link":"https:\/\/www.theblackvault.com\/documentarchive\/cryptology-and-the-united-states-intelligence-community\/","title":{"rendered":"Cryptology and the United States Intelligence Community"},"content":{"rendered":"<p>The following documents detail the use of\u00a0Cryptology inside the United States Intelligence Community.<\/p>\n<h3>Declassified Documents<\/h3>\n<p><a name=\"hist\"><\/a><img decoding=\"async\" src=\"https:\/\/www.theblackvault.com\/images\/pdf.gif\" alt=\"\" \/> <a href=\"https:\/\/documents.theblackvault.com\/documents\/nsa\/history_comsec.pdf\">A History of U.S. Communications Security<\/a> Volume I [94 Pages, 3.18mb]<\/p>\n<p><a href=\"https:\/\/documents.theblackvault.com\/documents\/nsa\/history_comsec_ii.pdf\"><img decoding=\"async\" src=\"https:\/\/www.theblackvault.com\/images\/pdf.gif\" alt=\"\" \/> A History of U.S. Communications Security<\/a> Volume II [61 Pages, 2.37mb]<\/p>\n<p><a href=\"https:\/\/www.theblackvault.com\/documentarchive\/american-cryptology-during-the-cold-war-1945-1989\/\">American Cryptology During the Cold War<\/a> 1945-1989, Book I-IV<\/p>\n<p><a name=\"gis\"><\/a><img decoding=\"async\" src=\"https:\/\/www.theblackvault.com\/images\/pdf.gif\" alt=\"\" \/> <a href=\"https:\/\/documents.theblackvault.com\/documents\/nsa\/cryptology_of_gis.pdf\">The Cryptology of the German Intelligence Services<\/a> [38 Pages, 2.01mb]<\/p>\n<p><a name=\"clandestine\"><\/a><img decoding=\"async\" src=\"https:\/\/www.theblackvault.com\/images\/pdf.gif\" alt=\"\" \/> <a href=\"https:\/\/documents.theblackvault.com\/documents\/nsa\/german_clandestine_activities.pdf\">German Clandestine Activities in South America in World War II<\/a> [78 Pages, 4.80mb]<\/p>\n<p><img decoding=\"async\" src=\"https:\/\/www.theblackvault.com\/images\/pdf.gif\" alt=\"\" \/> <a href=\"http:\/\/www.theblackvault.com\/documents\/cryptography\/in_shadow_ward.pdf\">In the Shadow of War<\/a><\/p>\n<p><a name=\"nsaorigins\"><\/a><img decoding=\"async\" src=\"https:\/\/www.theblackvault.com\/images\/pdf.gif\" alt=\"\" \/> <a href=\"https:\/\/documents.theblackvault.com\/documents\/nsa\/origins_of_nsa.pdf\">The Origins of the National Security Agency 1940-1952<\/a> [155 Pages, 9.83mb]<\/p>\n<p><img decoding=\"async\" src=\"https:\/\/www.theblackvault.com\/images\/pdf.gif\" alt=\"\" \/><a href=\"http:\/\/www.theblackvault.com\/documents\/cryptography\/purple_dragon.pdf\"> Purple Dragon<\/a><\/p>\n<p><img decoding=\"async\" src=\"https:\/\/www.theblackvault.com\/images\/pdf.gif\" alt=\"\" \/><a href=\"http:\/\/www.theblackvault.com\/documents\/cryptography\/spartans_in_darkness_8152884.pdf\"> Spartans in Darkness<\/a><\/p>\n<p><img decoding=\"async\" src=\"https:\/\/www.theblackvault.com\/images\/pdf.gif\" alt=\"\" \/> <a href=\"http:\/\/www.theblackvault.com\/documents\/cryptography\/work_against_tide.pdf\">Working Against the Tide<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>The following documents detail the use of\u00a0Cryptology inside the United States Intelligence Community. Declassified Documents A History of U.S. Communications Security Volume I [94 Pages, 3.18mb] A History of U.S. Communications Security Volume II [61 Pages, 2.37mb] American Cryptology During the Cold War 1945-1989, Book I-IV The Cryptology of the German Intelligence Services [38 Pages,<\/p>\n","protected":false},"author":1,"featured_media":389,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"episode_type":"","audio_file":"","transcript_file":"","podmotor_file_id":"","podmotor_episode_id":"","cover_image":"","cover_image_id":"","duration":"","filesize":"","filesize_raw":"","date_recorded":"","explicit":"","block":"","_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[34],"tags":[202],"class_list":{"0":"post-388","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-cryptology","8":"tag-cryptology"},"aioseo_notices":[],"jetpack_featured_media_url":"https:\/\/www.theblackvault.com\/documentarchive\/wp-content\/uploads\/2015\/02\/it_photo_97675.jpg","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/www.theblackvault.com\/documentarchive\/wp-json\/wp\/v2\/posts\/388","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.theblackvault.com\/documentarchive\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.theblackvault.com\/documentarchive\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.theblackvault.com\/documentarchive\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.theblackvault.com\/documentarchive\/wp-json\/wp\/v2\/comments?post=388"}],"version-history":[{"count":1,"href":"https:\/\/www.theblackvault.com\/documentarchive\/wp-json\/wp\/v2\/posts\/388\/revisions"}],"predecessor-version":[{"id":18797,"href":"https:\/\/www.theblackvault.com\/documentarchive\/wp-json\/wp\/v2\/posts\/388\/revisions\/18797"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.theblackvault.com\/documentarchive\/wp-json\/wp\/v2\/media\/389"}],"wp:attachment":[{"href":"https:\/\/www.theblackvault.com\/documentarchive\/wp-json\/wp\/v2\/media?parent=388"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.theblackvault.com\/documentarchive\/wp-json\/wp\/v2\/categories?post=388"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.theblackvault.com\/documentarchive\/wp-json\/wp\/v2\/tags?post=388"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}